General

  • Target

    cec38458f77fb0f094fb9182e73a041d646bc5cc057cde2b8c527ced41896403

  • Size

    218KB

  • Sample

    221220-k722nshb46

  • MD5

    92ccfc59d422fc34cfa500f5d4198b36

  • SHA1

    880f73dbdaf8ba18ba32415282fb3a1b22e92b6a

  • SHA256

    cec38458f77fb0f094fb9182e73a041d646bc5cc057cde2b8c527ced41896403

  • SHA512

    7956378f88b56188c7dc6f4f1e2c64e540788fd5ecf9135a6c674dac7b750c0b59abd7601b3577cc6ccb3594b0607e704de05ff1f1fa846f34b9da33a660e0ac

  • SSDEEP

    3072:yzpGUmLKgc9Rk4T9OSNYR5udR6NOQr2W3C8V7b/9xLFpnldNHCDml:yd9mLxd45OSk3rZRlbFphCa

Malware Config

Targets

    • Target

      cec38458f77fb0f094fb9182e73a041d646bc5cc057cde2b8c527ced41896403

    • Size

      218KB

    • MD5

      92ccfc59d422fc34cfa500f5d4198b36

    • SHA1

      880f73dbdaf8ba18ba32415282fb3a1b22e92b6a

    • SHA256

      cec38458f77fb0f094fb9182e73a041d646bc5cc057cde2b8c527ced41896403

    • SHA512

      7956378f88b56188c7dc6f4f1e2c64e540788fd5ecf9135a6c674dac7b750c0b59abd7601b3577cc6ccb3594b0607e704de05ff1f1fa846f34b9da33a660e0ac

    • SSDEEP

      3072:yzpGUmLKgc9Rk4T9OSNYR5udR6NOQr2W3C8V7b/9xLFpnldNHCDml:yd9mLxd45OSk3rZRlbFphCa

    • Danabot

      Danabot is a modular banking Trojan that has been linked with other malware.

    • Detects Smokeloader packer

    • SmokeLoader

      Modular backdoor trojan in use since 2014.

    • Blocklisted process makes network request

    • Downloads MZ/PE file

    • Executes dropped EXE

    • Loads dropped DLL

    • Checks installed software on the system

      Looks up Uninstall key entries in the registry to enumerate software on the system.

    • Suspicious use of SetThreadContext

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

3
T1012

System Information Discovery

3
T1082

Peripheral Device Discovery

1
T1120

Tasks